Operating Systems: Introduction to Operating Systems, Process Management CPU Scheduling Algorithms (FCFS, SJF, SJF Preemptive, Priority, Priority Preemptive, RR) Memory Management: Contiguous Memory Allocation, Paging, Segmentation
Posts
Showing posts from September, 2019
- Get link
- X
- Other Apps
Computer Networks Transmission Media Network Topology (Bus, Star, Ring, Mesh) Interconnecting Devices (Hubs, Switches, Bridges, Repeaters, Routers) ISO-OSI and TCP/IP Reference Models and Protocols Network Classification (PAN, LAN, MAN, WAN, internet, Internet) IPv4 Header Format Transport Layer & Application Layer Dijkstra's Shortest Path Routing Algorithm Distance Vector Routing Algorithm Link State Routing Algorithm Network Security Basics: Symmetric Key Cryptography Asymmetric Key Cryptography: RSA Algorithm Substitution and Transposition Ciphers, Firewalls, Viruses, Malicious programs
- Get link
- X
- Other Apps
Database Management Systems Introduction to DBMS Database Architecture (Diff. b/w 2-tier, 3-tier and n-tier Architectures) Database Design: E-R Model, Cardinality, Weak-Entity Sets Abstraction, Schema, Constraints Difference between Super Key, Candidate Key, Primary Key and Foreign Key Constraints SQL Commands Normalization 1NF, 2NF, 3NF, BCNF, 4NF Asymmetric Key Cryptography: RSA Algorithm
- Get link
- X
- Other Apps
Data Structures: Arrays, Linked Lists, Stacks, Queues, Trees, Graphs Constructing a Binary Tree From Preorder and Inorder Traversals Infix to Postfix Conversion and Postfix Evaluation using Stacks Sorting Techniques with Examples (BubbleSort, QuickSort, InsertionSort, SelectionSort) Searching Techniques (Linear Search, Binary Search, Hashing) Time Complexities of Sorting and Searching Algorithms